Rina Steenkamp - Privacy and technology
[Unauthorised tapping into or hacking of mobile communications | Government and IT - "a recipe for rip-offs" - time for a new approach | Security and privacy controls for federal information systems and organizations - Appendix J - privacy control catalog | Imperva's web application attack report, Edition #1 - July 2011 | If search neutrality is the answer, what's the question? | Pirates of the ISPs - Tactics for turning online crooks into international pariahs | The effect of piracy on the quality of information goods | Freedom of expression on the Internet | The anti-counterfeiting trade agreement (ACTA) - an assessment | Opinion 15/2011 on the definition of consent | Orientations for EU ICT R&D & innovation beyond 2013 - 10 key recommendations | Supplement to Authentication in an Internet banking environment | Social media risks and mitigation | ePrivacy Directive - circumstances, procedures and formats for personal data breach notifications | Do not track or right on track? The privacy implications of online behavioural advertising | Wiretap report 2010 | Perceptions about network security | The underground economy of fake antivirus software | Information is the currency of democracy | 2010-2011 Annual report | 2010 Annual report of the Interception of Communications Commissioner | 2011 CWE/SANS Top 25 most dangerous software errors | Resolution on privacy and security related to smart meters | The [Critical Infrastructure Protection] Program - Are we on the right path or at a precipice?]
A report by the House of Commons Home Affairs Committee.
House of Commons Home Affairs Committee: Unauthorised tapping into or hacking of mobile communications (PDF)
[Open link in this window | Open link in new window]
UK Parliament: MPs publish report on unauthorised tapping or hacking of mobile communications
[Open link in this window | Open link in new window]
Out-law.com: Information Commissioner should be given RIPA role, says Commons committee
[Open link in this window | Open link in new window]
HawkTalk: Parliament calls for joined up enforcement and an Information Commissioner who should have RIPA responsibilities
[Open link in this window | Open link in new window]
A report by the UK House of Commons Public Administration Select Committee.
Public Administration Select Committee: Government and IT - "a recipe for rip-offs" - time for a new approach
[Open link in this window | Open link in new window]
UK Parliament: MPs publish report on Government and IT
[Open link in this window | Open link in new window]
The Register: Cabinet Office government-by-Facebook plans probed
[Open link in this window | Open link in new window]
BBC News: IT giants 'ripping off Whitehall', say MPs
[Open link in this window | Open link in new window]
The Guardian: Government wasting public money on overpriced IT projects - MPs
[Open link in this window | Open link in new window]
The Register: MPs slam government's 'obscene' IT spend
[Open link in this window | Open link in new window]
NTOUK: House of Commons publishes its report on government IT
[Open link in this window | Open link in new window]
When IT meets Politics: Don't just read the summary - the PASC report goes to the heart of why the rip-off image has come about
[Open link in this window | Open link in new window]
A proposal by NIST.
NIST: Security and privacy controls for federal information systems and organizations - Appendix J - privacy control catalog (PDF)
[Open link in this window | Open link in new window]
NIST: NIST proposes new privacy controls for federal information systems and organizations
[Open link in this window | Open link in new window]
NIST: Publications - Drafts - SP 800-53 Appendix J
[Open link in this window | Open link in new window]
Privacy Lives: NIST proposes new privacy controls for federal information systems and organizations
[Open link in this window | Open link in new window]
A report by Imperva.
Imperva: Imperva's web application attack report, Edition #1 - July 2011 (PDF)
[Open link in this window | Open link in new window]
Imperva: Web applications under attack every two minutes, imperva finds
[Open link in this window | Open link in new window]
ReadWriteWeb: Report - Web applications attacked every 2 minutes
[Open link in this window | Open link in new window]
AG: Webapplicaties elke 2 minuten aangevallen
[Open link in this window | Open link in new window]
Techmeme
[Open link in this window | Open link in new window]
A paper by Geoffrey A. Manne and Joshua D. Wright.
Geoffrey A. Manne and Joshua D. Wright: If search neutrality is the answer, what's the question? (SSRN)
[Open link in this window | Open link in new window]
TLF: FairSearch's non-sequitor response
[Open link in this window | Open link in new window]
A paper by Noah Schachtman.
Noah Schachtman: Pirates of the ISPs - Tactics for turning online crooks into international pariahs (PDF)
[Open link in this window | Open link in new window]
Brookings: Pirates of the ISPs - Tactics for turning online crooks into international pariahs
[Open link in this window | Open link in new window]
Tao Security: Noah Schachtman's Pirates of the ISPs
[Open link in this window | Open link in new window]
A paper by Atanu Lahiri and Debabrata Dey.
Atanu Lahiri and Debabrata Dey: The effect of piracy on the quality of information goods (SSRN)
[Open link in this window | Open link in new window]
Techdirt: New study - piracy increases the quality of content
[Open link in this window | Open link in new window]
More at... [11/07/29 (NL/01)]
More at... [11/07/29 (NL/02)]
More at... [11/07/29 (NL/03)]
A study by OSCE.
OSCE: Freedom of expression on the Internet (PDF)
[Open link in this window | Open link in new window]
Tweakers.net: OVSE bekritiseert internetcensuur en -afsluiting
[Open link in this window | Open link in new window]
Out-law.com: Internet disconnection breaches free expression rights, says co-operation body
[Open link in this window | Open link in new window]
Ars Technica: Yet another report - Internet disconnections a "disproportionate" penalty
[Open link in this window | Open link in new window]
A study requested by the European Parliament.
European Parliament: The anti-counterfeiting trade agreement (ACTA) - an assessment (PDF)
[Open link in this window | Open link in new window]
Several authors: Opinion of European academics on Anti-Counterfeiting Trade Agreement (PDF)
[Open link in this window | Open link in new window]
BoF: Anti-piraterijverdrag ACTA onder vuur bij Europees Parlement
[Open link in this window | Open link in new window]
La quadrature du net: European Parliament study confirms ACTA must be rejected
[Open link in this window | Open link in new window]
An opinion by the Article 29 data protection working party.
Article 29 data protection working party: Opinion 15/2011 on the definition of consent (PDF)
[Open link in this window | Open link in new window]
WP29: Documents adopted by the Data Protection Working Party, 2011
[Open link in this window | Open link in new window]
SCOnline: Duidelijkheid over 'toestemming' in privacykwesties
[Open link in this window | Open link in new window]
MedicalFacts: Europese privacytoezichthouders verduidelijken het begrip 'toestemming'
[Open link in this window | Open link in new window]
HL: Article 29 Working Party guidelines on consent will lead to more pop-ups
[Open link in this window | Open link in new window]
IT en Recht: Wat is toestemming?
[Open link in this window | Open link in new window]
Inside Privacy: Working Party 29 releases new opinion on the meaning of "consent"
[Open link in this window | Open link in new window]
A report from the Information Society Technologies Advisory Group.
Information Society Technologies Advisory Group: Orientations for EU ICT R&D & innovation beyond 2013 - 10 key recommendations (PDF)
[Open link in this window | Open link in new window]
IST Advisory Group (ISTAG)
[Open link in this window | Open link in new window]
European Commission: EU ICT R&D and innovation beyond 2013 - 10 key recommendations
[Open link in this window | Open link in new window]
A publication by the Federal Financial Institutions Examination Council.
Federal Financial Institutions Examination Council: Supplement to Authentication in an Internet banking environment (PDF)
[Open link in this window | Open link in new window]
FFIEC: FFIEC releases supplemental guidance on Internet banking authentication
[Open link in this window | Open link in new window]
Inside Privacy: FFIEC releases supplement to authentication guidance
[Open link in this window | Open link in new window]
A publication for the financial services industry by BITS.
BITS: Social media risks and mitigation (PDF)
[Open link in this window | Open link in new window]
HL: Financial services industry group issues social media guidance
[Open link in this window | Open link in new window]
More at... [11/07/22 (NL/01)]
A public consultation document by the European Commission.
European Commission: ePrivacy Directive - circumstances, procedures and formats for personal data breach notifications (PDF)
[Open link in this window | Open link in new window]
The Register: Steelie Neelie - 'Help us form Brussels data breach policy'
[Open link in this window | Open link in new window]
Security.nl: Kroes vraagt input voor meldplicht datalekken
[Open link in this window | Open link in new window]
European Commission: Digital Agenda - Commission consults on practical rules for notifying personal data breaches
[Open link in this window | Open link in new window]
A public lecture by Peter Hustinx.
Peter Hustinx: Do not track or right on track? The privacy implications of online behavioural advertising (PDF)
[Open link in this window | Open link in new window]
When IT meets Politics: What is the difference between phone hacking and behavioural advertising
[Open link in this window | Open link in new window]
Out-law.com: Commission advice on cookies is ambiguous, data protection watchdog says
[Open link in this window | Open link in new window]
Security.nl: "Elke internetbrouwser moet privacy-wizard"
[Open link in this window | Open link in new window]
A report by the Administrative Office of the US Courts.
Administrative Office of the US Courts: Wiretap report 2010
[Open link in this window | Open link in new window]
Ms. Smith: They ARE listening - law enforcement wiretapping jumps 34%
[Open link in this window | Open link in new window]
More at... [11/07/16 (NL/01)]
More at... [11/07/16 (NL/02)]
More at... [11/07/16 (NL/03)]
A survey of IT and IT security practitioners in the U.S. by Ponemon Institute LLC.
Ponemon Institute LLC: Perceptions about network security (PDF)
[Open link in this window | Open link in new window]
Concurring Opinions: Drip, drip, drip - the statistical "certainty" of data leaks
[Open link in this window | Open link in new window]
An article by Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, and Giovanni Vigna.
Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, and Giovanni Vigna: The underground economy of fake antivirus software (PDF)
[Open link in this window | Open link in new window]
DarkReading: Researchers dissect the underground economy of fake antivirus software
[Open link in this window | Open link in new window]
Report and financial statements 2010/11 by the Information Commissioner's Office.
Information Commissioner's Office: Information is the currency of democracy (PDF)
[Open link in this window | Open link in new window]
ICO: Annual reports
[Open link in this window | Open link in new window]
Inside Privacy: UK ICO calls for more privacy audits
[Open link in this window | Open link in new window]
A report by the Saskatchewan Information and Privacy Commissioner.
Saskatchewan Information and Privacy Commissioner: 2010-2011 Annual report (PDF)
[Open link in this window | Open link in new window]
Winnipeg Free Press: Commissioner says Saskatchewan 'bedevilled' by privacy breaches
[Open link in this window | Open link in new window]
PHIprivacy; Commissioner says Saskatchewan 'bedevilled' by privacy breaches
[Open link in this window | Open link in new window]
A report by Sir Paul Kennedy.
Sir Paul Kennedy: 2010 Annual report of the Interception of Communications Commissioner (PDF)
[Open link in this window | Open link in new window]
Out-law.com: MI5 admits to wrongful surveillance of innocent people, new report says
[Open link in this window | Open link in new window]
More at... [11/07/09 (NL/01)]
Research by CWE/SANS.
CWE/SANS: 2011 CWE/SANS Top 25 most dangerous software errors
[Open link in this window | Open link in new window]
Security.nl: Top 25 gevaarlijkste softwarefouten
[Open link in this window | Open link in new window]
A document by the Trans Atlantic Consumer Dialogue.
Trans Atlantic Consumer Dialogue: Resolution on privacy and security related to smart meters (PDF)
[Open link in this window | Open link in new window]
Epic.org: Consumer groups recommend privacy safeguards on "smart meter" services
[Open link in this window | Open link in new window]
A paper by Stephen Flanagan.
Stephen Flanagan: The [Critical Infrastructure Protection] Program - Are we on the right path or at a precipice? (PDF)
[Open link in this window | Open link in new window]
Smart Grid Security: The best talk ever given on NERC CIPs and grid security... period
[Open link in this window | Open link in new window]
More at... [11/07/02 (NL/01)]
More at... [11/07/02 (NL/02)]
More at... [11/07/02 (NL/03)]
More at... [11/07/02 (NL/04)]
More at... [11/07/02 (NL/05)]